Cheating-immune secret sharing schemes from codes and cumulative arrays
From MaRDI portal
Publication:2392682
DOI10.1007/s12095-012-0076-4zbMath1335.94094OpenAlexW2049075413MaRDI QIDQ2392682
Huaxiong Wang, Romar B. dela Cruz
Publication date: 2 August 2013
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12095-012-0076-4
Related Items (1)
Uses Software
Cites Work
- Generalised cumulative arrays in secret sharing
- How to share a secret with cheaters
- The Magma algebra system. I: The user language
- Secret sharing schemes with detection of cheaters for a general access structure
- Properties and constraints of cheating-immune secret sharing schemes
- Distributing the encryption and decryption of a block cipher
- How to share a secret
- A spectral characterization of correlation-immune combining functions
- Fundamentals of Error-Correcting Codes
- On secret sharing systems
- Optimum Secret Sharing Scheme Secure against Cheating
- Progress in Cryptology - INDOCRYPT 2004
- Information Security and Cryptology - ICISC 2003
- Information Security and Cryptology
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Cheating-immune secret sharing schemes from codes and cumulative arrays